header-logo
Suggest Exploit
vendor:
Guestbook
by:
Sora
6.4
CVSS
MEDIUM
Remote Admin Access Exploit
N/A
CWE
Product Name: Guestbook
Affected Version From: 1
Affected Version To: 1
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows and Linux
N/A

Jevonweb Guestbook Remote Admin Access Exploit

Jevonweb Guestbook suffers a remote admin access exploit in setup.php.

Mitigation:

Add setup.php to the webhost's .htaccess file.
Source

Exploit-DB raw data:

# Vendor: http://www.jevonweb.f2s.com/
# Version: 1.0
# Tested on: Windows and Linux
---------------------------------------
> Jevonweb Guestbook Remote Admin Access Exploit
> Author: Sora
> Contact: vhr95zw@hotmail.com
> Google Dork: "Jevonweb Guestbook" "http://www.jevonweb.f2s.com/" inurl:/cp/Scripts/PHP/Guestbook/config.php

Description:
Jevonweb Guestbook suffers a remote admin access exploit in setup.php.

Solution:
Add setup.php to the webhost's .htaccess file.

# Code: http://www.site.com/cp/Scripts/PHP/Guestbook/read.txt
# Greetz: Bw0mp, Popc0rn, Xermes, T3eS, Timeb0mb, [H]aruhiSuzumiya, and Revelation!